mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-30 15:42:25 -05:00 
			
		
		
		
	
		
			
				
	
	
		
			113 lines
		
	
	
	
		
			4.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			113 lines
		
	
	
	
		
			4.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|    GoToSocial
 | |
|    Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org
 | |
| 
 | |
|    This program is free software: you can redistribute it and/or modify
 | |
|    it under the terms of the GNU Affero General Public License as published by
 | |
|    the Free Software Foundation, either version 3 of the License, or
 | |
|    (at your option) any later version.
 | |
| 
 | |
|    This program is distributed in the hope that it will be useful,
 | |
|    but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
|    GNU Affero General Public License for more details.
 | |
| 
 | |
|    You should have received a copy of the GNU Affero General Public License
 | |
|    along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| */
 | |
| 
 | |
| package federation
 | |
| 
 | |
| import (
 | |
| 	"github.com/gin-gonic/gin"
 | |
| )
 | |
| 
 | |
| // UsersGETHandler should be served at https://example.org/users/:username.
 | |
| //
 | |
| // The goal here is to return the activitypub representation of an account
 | |
| // in the form of a vocab.ActivityStreamsPerson. This should only be served
 | |
| // to REMOTE SERVERS that present a valid signature on the GET request, on
 | |
| // behalf of a user, otherwise we risk leaking information about users publicly.
 | |
| //
 | |
| // And of course, the request should be refused if the account or server making the
 | |
| // request is blocked.
 | |
| func (m *Module) UsersGETHandler(c *gin.Context) {
 | |
| 	// l := m.log.WithFields(logrus.Fields{
 | |
| 	// 	"func": "UsersGETHandler",
 | |
| 	// 	"url":  c.Request.RequestURI,
 | |
| 	// })
 | |
| 	// requestedUsername := c.Param(UsernameKey)
 | |
| 	// if requestedUsername == "" {
 | |
| 	// 	err := errors.New("no username specified in request")
 | |
| 	// 	l.Debug(err)
 | |
| 	// 	c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
 | |
| 	// 	return
 | |
| 	// }
 | |
| 
 | |
| 	// // make sure this actually an AP request
 | |
| 	// format := c.NegotiateFormat(ActivityPubAcceptHeaders...)
 | |
| 	// if format == "" {
 | |
| 	// 	err := errors.New("could not negotiate format with given Accept header(s)")
 | |
| 	// 	l.Debug(err)
 | |
| 	// 	c.JSON(http.StatusNotAcceptable, gin.H{"error": err.Error()})
 | |
| 	// 	return
 | |
| 	// }
 | |
| 	// l.Tracef("negotiated format: %s", format)
 | |
| 
 | |
| 	// // get the account the request is referring to
 | |
| 	// requestedAccount := >smodel.Account{}
 | |
| 	// if err := m.db.GetLocalAccountByUsername(requestedUsername, requestedAccount); err != nil {
 | |
| 	// 	l.Errorf("database error getting account with username %s: %s", requestedUsername, err)
 | |
| 	// 	// we'll just return not authorized here to avoid giving anything away
 | |
| 	// 	c.JSON(http.StatusUnauthorized, gin.H{"error": "not authorized"})
 | |
| 	// 	return
 | |
| 	// }
 | |
| 
 | |
| 	// // and create a transport for it
 | |
| 	// transport, err := m.federator.TransportController().NewTransport(requestedAccount.PublicKeyURI, requestedAccount.PrivateKey)
 | |
| 	// if err != nil {
 | |
| 	// 	l.Errorf("error creating transport for username %s: %s", requestedUsername, err)
 | |
| 	// 	// we'll just return not authorized here to avoid giving anything away
 | |
| 	// 	c.JSON(http.StatusUnauthorized, gin.H{"error": "not authorized"})
 | |
| 	// 	return
 | |
| 	// }
 | |
| 
 | |
| 	// // authenticate the request
 | |
| 	// authentication, err := federation.AuthenticateFederatedRequest(transport, c.Request)
 | |
| 	// if err != nil {
 | |
| 	// 	l.Errorf("error authenticating GET user request: %s", err)
 | |
| 	// 	c.JSON(http.StatusUnauthorized, gin.H{"error": "not authorized"})
 | |
| 	// 	return
 | |
| 	// }
 | |
| 
 | |
| 	// if !authentication.Authenticated {
 | |
| 	// 	l.Debug("request not authorized")
 | |
| 	// 	c.JSON(http.StatusUnauthorized, gin.H{"error": "not authorized"})
 | |
| 	// 	return
 | |
| 	// }
 | |
| 
 | |
| 	// requestingAccount := >smodel.Account{}
 | |
| 	// if authentication.RequestingPublicKeyID != nil {
 | |
| 	// 	if err := m.db.GetWhere("public_key_uri", authentication.RequestingPublicKeyID.String(), requestingAccount); err != nil {
 | |
| 
 | |
| 	// 	}
 | |
| 	// }
 | |
| 
 | |
| 	// authorization, err := federation.AuthorizeFederatedRequest
 | |
| 
 | |
| 	// person, err := m.tc.AccountToAS(requestedAccount)
 | |
| 	// if err != nil {
 | |
| 	// 	l.Errorf("error converting account to ap person: %s", err)
 | |
| 	// 	c.JSON(http.StatusUnauthorized, gin.H{"error": "not authorized"})
 | |
| 	// 	return
 | |
| 	// }
 | |
| 
 | |
| 	// data, err := person.Serialize()
 | |
| 	// if err != nil {
 | |
| 	// 	l.Errorf("error serializing user: %s", err)
 | |
| 	// 	c.JSON(http.StatusUnauthorized, gin.H{"error": "not authorized"})
 | |
| 	// 	return
 | |
| 	// }
 | |
| 
 | |
| 	// c.JSON(http.StatusOK, data)
 | |
| }
 |